SSH

Body

Summary

SSH stands for Secure Shell and is the command used to connect remotely to another computer (usually a Mac or Linux computer) through a terminal window.

Environment

SSH in LSA

Directions

To connect to a remote Linux machine, or any machine running the SSH server software (sshd), please refer to article corresponding to your client OS:

Notes

Access Considerations

  • By default, we only allow ssh access to Linux machines from within the university networks or by using the VPN. Some systems may have more restrictive firewalls. If you are unable to connect, consider that your access may be denied by the host-based firewall on the target machine.
  • The root user is typically not permitted to log in over ssh. This is best-practice security and should not be casually overridden. If you need to perform a superuser function, use an admin service account and sudo.

Linux Command Line

Read the Learning the Linux Command Line Interface article if you are unfamiliar with how to use the Linux command line.

Public Key Authentication

It is possible to bypass the SSH password prompt by using public-key authentication. This can be done for any OS.

Running Graphical Software over SSH

Sometimes, you may need to connect to a machine remotely and run some software that launches graphical windows. See the article Running Graphical Software over SSH for details.

Details

Details

Article ID: 1540
Created
Tue 5/26/20 6:14 PM
Modified
Fri 11/1/24 8:14 AM

Related Articles

Related Articles (2)

Information about training sessions available for users to become familiar with the Great Lakes high-performance computing cluster